Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.
At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.
Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.
CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
Section 1.1. Differentiate among various systems security threats.
Section 1.2. Explain the security risks pertaining to system hardware and peripherals.
Section 1.3. Implement OS hardening practices and procedures to achieve workstation and server security.
Section 1.4. Carry out the appropriate procedures to establish application security.
Section 1.5. Implement security applications.
Section 1.6. Explain the purpose and application of virtualization technology.
Section 1.7. Review Questions
Section 1.8. Answers to Review Questions
Section 2.1. Differentiate between the different ports & protocols, their respective threats and mitigation techniques.
Section 2.2. Distinguish between network design elements and components.
Section 2.3. Determine the appropriate use of network security tools to facilitate network security.
Section 2.4. Apply the appropriate network tools to facilitate network security.
Section 2.5. Explain the vulnerabilities and mitigations associated with network devices.
Section 2.6. Explain the vulnerabilities and mitigations associated with various transmission media.
Section 2.7. Explain the vulnerabilities and implement mitigations associated with wireless networking.
Section 2.8. Review Questions
Section 2.9. Answers to Review Questions
Section 3.1. Identify and apply industry best practices for access control methods.
Section 3.2. Explain common access control models and the differences between each.
Section 3.3. Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.
Section 3.4. Apply appropriate security controls to file and print resources.
Section 3.5. Compare and implement logical access control methods.
Section 3.6. Summarize the various authentication models and identify the components of each.
Section 3.7. Deploy various authentication models and identify the components of each.
Section 3.8. Explain the difference between identification and authentication (identity proofing).
Section 3.9. Explain and apply physical access security methods.
Section 3.10. Review Questions
Section 3.11. Answers to Review Questions
Section 4.1. Conduct risk assessments and implement risk mitigation.
Section 4.2. Carry out vulnerability assessments using common tools.
Section 4.3. Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.
Section 4.4. Use monitoring tools on systems and networks and detect security-related anomalies.
Section 4.5. Compare and contrast various types of monitoring methodologies.
Section 4.6. Execute proper logging procedures and evaluate the results.
Section 4.7. Conduct periodic audits of system security settings.
Section 4.8. Review Questions
Section 4.9. Answers to Review Questions
Section 5.1. Explain general cryptography concepts.
Section 5.2. Explain basic hashing concepts and map various algorithms to appropriate applications.
Section 5.3. Explain basic encryption concepts and map various algorithms to appropriate applications.
Section 5.4. Explain and implement protocols.
Section 5.5. Explain core concepts of public key cryptography.
Section 5.6. Implement PKI and certificate management.
Section 5.7. Review Questions
Section 5.8. Answers to Review Questions
Section 6.1. Explain redundancy planning and its components.
Section 6.2. Implement disaster recovery procedures.
Section 6.3. Differentiate between and execute appropriate incident response procedures.
Section 6.4. Identify and explain applicable legislation and organizational policies.
Section 6.5. Explain the importance of environmental controls.
Section 6.6. Explain the concept of and how to reduce the risks of social engineering.
Section 6.7. Review Questions
Section 6.8. Answers to Review Questions
25 Feb-1 Mar 2019 (Penang)
15-19 Apr 2019
17-21 Jun 2019 (Penang)
15-19 Jul 2019
21-25 Oct 2019
9-13 Dec 2019 (Penang)